Slashdot videos: Now with more Slashdot!

View

Discuss

Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

HughPickens.com writes: The Globe and Mail reports that Edward Snowden's Russian lawyer, Anatoly Kucherena, says the fugitive former U.S. spy agency contractor is working with American and German lawyers to return home. "I won't keep it secret that he wants to return back home. And we are doing everything possible now to solve this issue. There is a group of U.S. lawyers, there is also a group of German lawyers and I'm dealing with it on the Russian side." Kucherena added that Snowden is ready to return to the States, but on the condition that he is given a guarantee of a legal and impartial trial. The lawyer said Snowden had so far only received a guarantee from the U.S. Attorney General that he will not face the death penalty. Kucherena says Snowden is able to travel outside Russia since he has a three-year Russian residency permit, but "I suspect that as soon as he leaves Russia, he will be taken to the U.S. embassy."

An anonymous reader writes Tim Hoettges, the CEO of the world's third-largest telecoms company, has called for Google and Facebook to be regulated in the same way that telcos are, declaring that "There is a convergence between over-the-top web companies and classic telcos" and "We need one level regulatory environment for us all." The Deutsche Telekom chief was speaking at Monday's Mobile World Congress, and further argued for a loosening of the current regulations which telcos operate under, in order to provide the infrastructure development that governments and policy bodies are asking of them. Hoettges' imprecation comes in the light of news about the latest Google Dance — an annual change in ranking criteria which boosts some businesses and ruins others. The case for and against regulating Google-level internet entities comes down to one question: who do you trust to 'not be evil'?

Bennett Haselton writes: Vimeo and Youtube are pressured to remove a dark, fan-made "Power Rangers"
short film; Vimeo capitulated, while Youtube has so far left it up. I'm generally
against the overreach of copyright law, but in this case, how could anyone argue
the short film doesn't violate the rights of the franchise creator? And should
Vimeo and Youtube clarify their policies on the unauthorized use of copyrighted characters? Read on for the rest.

Sparrowvsrevolution writes A new Wired magazine story goes inside the North Korean rebel movement seeking to overthrow Kim Jong-un by smuggling USB drives into the country packed with foreign television and movies. As the story describes, one group has stashed USB drives in Chinese cargo trucks. Another has passed them over from tourist boats that meet with fishermen mid-river. Others arrange USB handoffs at the Chinese border in the middle of the night with walkie talkies, laser pointers, and bountiful bribes. Even Kim assassination comedy The Interview, which the North Korean government allegedly hacked Sony to prevent from being released, has made it into the country: Chinese traders' trucks carried 20 copies of the film across the border the day after Christmas, just two days after its online release.

HughPickens.com writes: The NY Times reports that Hillary Rodham Clinton exclusively used a personal email account to conduct government business as secretary of state, according to State Department officials. She may have violated federal requirements that officials' correspondence be retained as part of the agency's record. Clinton did not have a government email address during her four-year tenure at the State Department. Her aides took no actions to have her personal emails preserved on department servers at the time, as required by the Federal Records Act. "It is very difficult to conceive of a scenario — short of nuclear winter — where an agency would be justified in allowing its cabinet-level head officer to solely use a private email communications channel for the conduct of government business," said attorney Jason R. Baron. A spokesman for Clinton defended her use of the personal email account and said she has been complying with the "letter and spirit of the rules."

"What we are alleging is occurring is that there are individuals and organizations that are profiting from the storage and the exchange of child sexual exploitation material," Scott Tod, Deputy Commissioner of the Ontario Provincial Police (OPP), told Motherboard at a conference late last month, after speaking to a crowd of defense specialists. "They store it and they provide a secure website that you can log into, much like people do with illegal online gaming sites."

Mark Wilson writes While much of the news coming out of MWC 2015 has been dominated by Microsoft's Lumia 640, the Samsung Galaxy S6 Edge, and tablets from Sony, there's always room for something a little different. Following on from the security-focused Blackphone, Silent Circle used the Barcelona event to announce the follow-up — the Blackphone 2. The privacy-centric company has been working on the "world's first enterprise privacy platform" for some time now and the second generation Blackphone. As you would expect, there's a faster processor than before -- an 8-core beast -- as well as an upgraded 3GB RAM, a larger 5.5 inch screen and a bigger battery than before. Blackphone 2 has a $600 price tag and will be unleashed in July.

Lasrick writes The Bulletin of the Atomic Scientists has just launched a very cool interactive graphic to go with their famed Nuclear Notebook, the feature that tracks the world's nuclear arsenals. Now you can see at a glance who has nuclear weapons, when they got them, and how those numbers compare to each other. A short introductory video gives some background on the success of the Notebook, which has been tracking nukes since 1987.

An anonymous reader writes Last fall, Daniel Therrien, the government's newly appointed Privacy
Commissioner of Canada, released the annual
report on the Privacy Act, the legislation that governs how
government collects, uses, and discloses personal information. The
lead story from the report was the result of an audit of the Royal
Canadian Mounted Police practices regarding warrantless requests for
telecom subscriber information. Michael Geist now reports
that a secret internal memo reveals the situation was far worse,
with auditors finding the records from Canada's lead law
enforcement agency were unusable since they were "inaccurate and
incomplete."

BrianFagioli writes So what do these glasses from AVG Innovation Labs actually do? The security firm claims it can protect your identity in this new era of cameras everywhere. From the article: "'Through a mixture of technology and specialist materials, privacy wearables such as invisibility glasses can make it difficult for cameras or other facial recognition technologies to get a clear view of your identity', AVG claims. This is still in the prototype phase of testing, though it has been officially announced at Mobile World Congress in Barcelona. There's a lot of science behind this -- a series of infrared lights surrounding the eyes and nose is not visible to other people, but cameras will pick it up making recognition difficult at best. There's also reflective materials involved, which aids in the blocking, or so it's claimed."

Patrick O'Neill writes After a wave of account bannings that marks Twitter's most aggressive move ever against ISIS, new images circulated from militants shows founder Jack Dorsey in crosshairs with the caption "Twitter, you started this war." The famously tech-savy ISIS has met a number of defeats on American-built social media recently with sites like Twitter and YouTube banning the group's efforts in unprecedented numbers.

An anonymous reader writes I recently discovered that a partner web site of a financial institution I do business with makes it trivially easy to view documents that do not belong to me. As in, change the document ID in a URL and view someone else's financial documents. This requires no authentication, only a document URL. (Think along the lines of an online rebate center where you upload documents including credit card statements.) I immediately called customer service and spoke with a perplexed agent who unsurprisingly didn't know what to do with my call. I asked to speak with a supervisor who took good notes and promised a follow-up internally. I asked for a return call but have not yet heard back. In the meantime, I still have private financial information I consider to be publicly available. I'm trying to be responsible and patient in my handling of this, but I am second guessing how to move forward if not quickly resolved. So, Slashdot, how would you handle this situation?

retroworks writes "Washington Post reporter Caitlin Dewey leads with, "Revenge-porn impresario Craig Brittain is learning the hard way that karma is a real witch." The report states that the Federal Trade Commission has settled a complaint against Brittain, whose defunct site, "Is Anybody Down" was accused of unfair business practices. From the article: "The site paid its bills by soliciting women's nude photos on Craigslist and/or from their exes, publishing the photos without the women's permission (and often with their names and phone numbers attached), and then charging fees of $200 to $500 to take the photos down." Brittain agreed to destroy the image and never operate a revenge porn site again. However, On Feb. 9, "Brittain filed a takedown request to Google, demanding that the search engine stop linking to nearly two dozen URLs — including a number of news articles, and files on the case from the FTC — because they used photos of him and information about him without his permission." Ars Technica explains. "In this instance, fair use and general First Amendment principles are on Google's and the media's side."

New submitter SwampApe tips news that Uber has revealed a database breach from 2014. The company says the database contained names and diver's license numbers of their drivers, about 50,000 of which were accessed by an unauthorized third party. As part of their investigation into who was behind the breach, Uber has filed a lawsuit which includes a subpoena request for GitHub. "Uber's security team knows the public IP address used by the database invader, and wants to link that number against the IP addresses and usernames of anyone who looked at the GitHub-hosted gist in question – ID 9556255 – which we note today no longer exists. It's possible the gist contained a leaked login key, or internal source code that contained a key that should not have been made public."

"The work on the exchange was complete by February 2014, but going live with the website and providing a means for all Oregonians to sign up for health insurance coverage didn't match the former-Governor's re-election strategy to 'go after' Oracle," Oracle spokeswoman Deborah Hellinger said in a statement.

New submitter seoras sends news that PayPal is now refusing to handle payments for Mega, Kim Dotcom's cloud storage service. A report (PDF) issued in September of last year claimed Mega and other "cyberlocker" sites made a great deal of illicit money off piracy. Mega disputes this, of course, and says the report caused U.S. Senator Patrick Leahy to pressure credit card companies to stop working with Mega. Those companies then pressured PayPal to stop as well. The hosting company claims, "MEGA provided extensive statistics and other evidence showing that MEGA’s business is legitimate and legally compliant. After discussions that appeared to satisfy PayPal’s queries, MEGA authorised PayPal to share that material with Visa and MasterCard. Eventually PayPal made a non-negotiable decision to immediately terminate services to MEGA."

schwit1 sends this report from the National Journal:
A federal court has again renewed an order allowing the National Security Agency to continue its bulk collection of Americans' phone records, a decision that comes more than a year after President Obama pledged to end the controversial program. The Foreign Intelligence Surveillance Court approved this week a government request to keep the NSA's mass surveillance of U.S. phone metadata operating until June 1, coinciding with when the legal authority for the program is set to expire in Congress. The extension is the fifth of its kind since Obama said he would effectively end the Snowden-exposed program as it currently exists during a major policy speech in January 2014. Obama and senior administration officials have repeatedly insisted that they will not act alone to end the program without Congress.

An anonymous reader writes The BlackPhone, a $600-plus encrypted Android handset designed to keep the prying eyes of criminals and the government out of mobile communications, is now fully owned by Silent Circle thanks to the company raking in investment cash. Terms of the buyout deal with Spanish smartphone maker Geeksphone, the phone's hardware manufacturer, were not disclosed. Silent Circle said Thursday that it has raised $50 million and plans on showing off an encrypted 'enterprise privacy ecosystem' at World Mobile Congress next week. A BlackPhone tablet is on the way, too.

Probably -- if the device I want supports itProbably -- if it works as promisedProbably -- credit cards will be like checks in another decadeNot sure -- no strong opinions either wayDoubtful -- not a useful technology to meDoubtful -- it will be too fragmentedDoubtful -- privacy/security concernsDoes throwing my spare change at the cashier count as mobile?